MoonJian / Attack_Face_RecognitionLinks
The implementation of AttackAI in Ali Tianchi Security Competition Phase One.
☆30Updated 5 years ago
Alternatives and similar repositories for Attack_Face_Recognition
Users that are interested in Attack_Face_Recognition are comparing it to the libraries listed below
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 5 years ago
- ☆43Updated 4 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Updated 5 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 7 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Updated last year
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Updated last year
- An adversarial robustness evaluation library on face recognition.☆111Updated 2 years ago
- ☆42Updated 5 years ago
- [AAAI 2020] Pytorch codes for Regularized Fine-grained Meta Face Anti-spoofing☆142Updated 3 years ago
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆338Updated 4 years ago
- Code for Paper "Image Forgery Detection and Localization via a Reliability Fusion Map"☆84Updated 4 years ago
- ☆10Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆76Updated 2 years ago
- Implementation of the paper "Learning Meta Model for Zero- and Few-shot Face Anti-spoofing"☆64Updated 4 years ago
- The solution for the DeeperForensics Challenge 2020☆28Updated 4 years ago
- 2nd place solution for Kaggle Deepfake Detection Challenge☆166Updated 2 years ago
- A tensorflow implementation of paper "A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer"☆15Updated 6 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆90Updated 6 years ago
- A novel data-free model stealing method based on GAN☆129Updated 2 years ago
- DSP-FWA: Dual Spatial Pyramid for Exposing Face Warp Artifacts in DeepFake Videos☆68Updated last year
- Ali Face attack competition☆13Updated 6 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61Updated 6 years ago
- Multi-scale Analysis Strategies in PRNU-based Tampering Localization☆56Updated 5 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆414Updated 4 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆44Updated 2 years ago
- ☆50Updated 5 years ago
- Pytorch implementation of mainstream face recognition algorithms(ArcFace, CosFace).☆103Updated 4 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆77Updated 3 years ago
- Code repository for TUM Course in Advanced Deep Learning for Computer Vision☆70Updated 3 months ago